<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Wireless Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/wireless/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/wireless/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Thu, 18 Jan 2018 14:08:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</title>
		<link>https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/</link>
					<comments>https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 13:57:35 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Wi-Fi hotspot]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=1059</guid>

					<description><![CDATA[<p>After a series of ransomware attacks capturing the headlines past year, crypto mining malware and cryptojacking attacks came into the play. Just last month, a Starbucks customer found that the infected Wi-Fi hotspot was trying to mine Monero digital coins.</p>
<p>The post <a href="https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/">How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</h2>
<p style="text-align: justify;">After a series of ransomware attacks capturing the headlines past year, <strong>crypto mining malware and cryptojacking attacks</strong> came into the play. Just last month, a <strong>Starbucks customer found that the infected Wi-Fi hotspot</strong> was trying to <strong>mine Monero digital coins</strong>. It was a new kind of threat associated with <strong>using public hotspots</strong>, which are often labeled <strong>unsafe and users are advised to use VPN</strong> services for extra privacy.</p>
<p style="text-align: justify;">In a similar development, <strong>a security researcher named Arnau</strong> has published a <strong>proof-of-concept project</strong> that showcases how troublesome actors <strong>can exploit such public Wi-Fi networks</strong> and print free money.</p>
<p style="text-align: justify;">Named <strong>CoffeeMiner</strong>, this attack uses a<strong> script to perform autonomous MITM attack to inject some malicious JavaScript code into the HTML pages</strong>. The <strong>attack has been tested in the real-world scenario to turn smartphones and PCs into cryptomining bots</strong>.</p>
<p style="text-align: justify;">For performing <strong>MITM attack</strong>, the <strong>ARP spoofing technique is used</strong>. The researcher used <strong>dsniff library to perform the ARP spoofing attack</strong>. Using another tool named <strong>mitmproxy</strong>, the <strong>traffic</strong> going to the host <strong>is analyzed and JavaScript code is injected.</strong> To make the process cleaner, <strong>a single line of HTML code is injected; this line calls the miner.</strong></p>
<p><iframe title="coffeeMiner demo in real WiFi network" width="1170" height="658" src="https://www.youtube.com/embed/-TnzGLUD0DU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p style="text-align: justify;">As expected, the miner being used in the concept is from <strong>CoinHive</strong>. It’s a <strong>Monero miner that uses the CPU power to calculate hashes with Cryptonight PoW hash algorithm for mining.</strong></p>
<p style="text-align: justify;">The real-world demo of the attack using Kali Linux is shown above. The researcher has shared this attack for academic purposes and to showcase how easily one cybercriminal can exploit your weak security practices.</p>
<p><span style="font-size: 10pt;"><strong>source:</strong> <a href="https://fossbytes.com" target="_blank" rel="noopener">https://fossbytes.com</a></span></p>
<p>The post <a href="https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/">How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/144 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-02 00:02:29 by W3 Total Cache
-->